CISA has released a Malware Analysis Report on a critical vulnerability in Ivanti Connect Secure devices (CVE-2025-0282), enabling unauthorized access and malware deployment, including RESURGE and SPAWNSLOTH. RESURGE acts as a backdoor and rootkit, altering system files and evading detection. CISA urges immediate patching, network monitoring, and robust security practices to mitigate these threats.

What are business logic vulnerabilities?
Business logic vulnerabilities in software allow attackers to exploit flaws in design, enabling them to circumvent security measures and manipulate pricing, authentication, and other key